UR E27 Rev.1 Sep 2023 CLN
UR E27 Rev.1 Sep 2023 CLN
UR E27 Rev.1 Sep 2023 CLN
1.1 Introduction
Technological evolution of vessels, ports, container terminals, etc. and increased reliance
upon Operational Technology (OT) and Information Technology (IT) has created an
increased possibility of cyber-attacks to affect business, personnel data, human safety, the
safety of the ship, and also possibly threaten the marine environment. Safeguarding shipping
from current and emerging threats must involve a range of controls that are continually
evolving which would require incorporating security features in the equipment and systems at
design and manufacturing stage. It is therefore necessary to establish a common set of
minimum requirements to deliver systems and equipment that can be described as cyber
resilient.
This document specifies unified requirements for cyber resilience of on-board systems and
equipment.
1.2 Limitations
This UR does not cover environmental performance for the system hardware and the
functionality of the software. In addition to this UR, following URs shall be applied:
Note:
1. The Unified Requirement published in April 2022 was withdrawn before coming into
force on 1 January 2024
Non-mandatory guidance to
For navigation and radiocommunication systems, the application of IEC 61162-460 or other
equivalent standards in lieu of the required security capabilities in UR E27 section 4 may be
accepted by the Society, on the condition that requirements in IACS UR E26 are complied
with.
Attention is made to additional IACS documents on Computer Based Systems and Cyber
Resilience as follows:
IACS UR E22 “Computer based systems” includes requirements for design, construction,
commissioning and maintenance of computer-based systems where they depend on software
for the proper achievement of their functions. The requirements in E22 focus on the
functionality of the software and on the hardware supporting the software which provide
control, alarm, monitoring, safety or internal communication functions subject to classification
requirements.
IACS UR E26 “Cyber resilience of Ships” includes requirements for cyber resilience of ships,
with the purpose of providing technical means to stakeholders which would lead to cyber
resilient ships.
Computer Network: A connection between two or more computers for the purpose of
communicating data electronically by means of agreed communication protocols.
Cyber incident: An event resulting from any offensive cyber manoeuvre, either intentional or
unintentional, that targets or affects one or more CBS onboard, which actually or potentially
results in adverse consequences to an onboard system, network and computer or the
information that they process, store or transmit, and which may require a response action to
mitigate the consequences. Cyber incidents include unauthorized access, misuse,
modification, destruction or improper disclosure of the information generated, archived or
used in onboard CBS or transported in the networks connecting such systems. Cyber
incidents do not include system failures.
Cyber resilience: The capability to reduce the occurrence and mitigating the effects of
incidents arising from the disruption or impairment of operational technology (OT) used for the
safe operation of a ship, which potentially lead to dangerous situations for human safety,
safety of the vessel and/or threat to the environment.
continuous operation to maintain propulsion and steering but which are necessary for
E27 maintaining the vessel’s safety.
(cont)
Firewall: A logical or physical barrier that monitors and controls incoming and outgoing
network traffic controlled via predefined rules.
Firmware: Software embedded in electronic devices that provide control, monitoring and data
manipulation of engineered products and systems. These are normally self-contained and not
accessible to user manipulation.
Hardening: Hardening is the practice of reducing a system's vulnerability by reducing its
attack surface.
Network switch (Switch): A device that connects devices together on a computer network,
by using packet switching to receive, process and forward data to the destination device.
Operational technology (OT): Devices, sensors, software and associated networking that
monitor and control onboard systems. Operational technology systems may be thought of as
focusing on the use of data to control or monitor physical processes.
OT system: Computer based systems, which provide control, alarm, monitoring, safety
or internal communication functions.
Protocols: A common set of rules and signals that computers on the network use to
communicate. Protocols allow to perform data communication, network management and
security. Onboard networks usually implement protocols based on TCP/IP stacks or various
field buses.
Recovery: Develop and implement the appropriate activities to maintain plans for resilience
and to restore any capabilities or services that were impaired due to a cyber security event.
The Recovery function support s timely return to normal operations to reduce the impact
from a cyber security event.
E27 System Integrator: The specific person or organization responsible for the integration of
(cont) systems and products provided by suppliers into the system invoked by the requirements in
the ship specifications and for providing the integrated system. The system integrator may
also be responsible for integration of systems in the ship. Until vessel delivery, this role shall
be taken by the Shipyard unless an alternative organization is specifically
contracted/assigned this responsibility.
Untrusted network: Any network outside the scope of applicability of this UR.
2. Security Philosophy
2.1.1 A System can consist of group of hardware and software enabling safe, secure and
reliable operation of a process. Typical example could be Engine control system, DP system,
etc.
The cyber resilience requirements in section 4 will be applicable for all systems in scope of
UR E26 as applicable. Additional requirements related to interface with untrusted networks
will only apply for systems where such connectivity is designed.
2.3.1 Security measures for Essential system shall not adversely affect the systems
availability.
2.3.2 Implementation of security measures shall not cause loss of safety functions , loss of
control functions, loss of monitoring functions or loss of other functions which could result in
health, safety and environmental consequences.
2.3.3 The system shall be adequately designed to allow the ship to continue its mission
critical operations in a manner that ensures the confidentiality, integrity, and availability of the
data necessary for safety of the vessel, its systems, personnel and cargo.
Compensating countermeasure(s) shall meet the intent and rigor of the original stated
requirement considering the referenced standards as well as the differences between each
requirement and the related items in the standards, and follow the principles specified in
E27 section 3.1.3.
(cont)
3. Documentation
The following documents shall be submitted to Classification society for review and approval
in accordance with the requirements in this UR. See also section 6.2.
The physical topology diagram shall illustrate the physical architecture of the system. It shall
be possible to identify the hardware components in the CBS asset inventory. The diagram
shall illustrate the following:
The logical topology diagram shall illustrate the data flow between components in the system.
The diagram shall illustrate the following:
One combined topology diagram may be acceptable if all requested information can be
E27 clearly illustrated.
(cont)
3.1.3 Description of security capabilities
This document shall describe how the CBS with its hardware and software components
meets the required security capabilities in section 4.1.
Any network interfaces to other CBSs in the scope of applicability of UR E26 shall be
described. The description shall include destination CBS, data flows, and communication
protocols. If the System integrator has allocated the destination CBS to another security
zone, components providing protection of the security zone boundary (see UR E26 section
4.2.2.1) shall be described in detail if delivered as part of the CBS.
Any network interfaces to other systems or networks outside the scope of applicability of UR
E26 (untrusted networks) shall be described. The description shall specify compliance with
the additional security capabilities in section 4.2, and include relevant procedures or
instructions for the crew. Components providing protection of the security zone boundary (see
UR E26 section 4.2.2.1) shall be described in detail if delivered as part of the CBS.
A separate chapter shall be designated for each requirement. All hardware and software
components in the system shall be addressed in the description, as relevant.
If any requirement is not fully met, this shall be specified in the description, and compensating
countermeasures shall be proposed. The compensating countermeasures should:
Any supporting documents (e.g. OEM information) necessary to verify compliance with the
requirements shall be referenced in the description and submitted.
This document shall describe how to demonstrate by testing that the system complies with
the requirements in section 4.1 and 4.2, including any compensating countermeasures.
Demonstration of compliance by analytic evaluation may be specially considered. The
procedure shall include a separate chapter for each applicable requirement and describe:
- Necessary test setup (i.e. to ensure the test can be repeated with the same
expected result)
- Test equipment
- Initial condition(s)
- Test methodology, detailed test steps
- Expected results and acceptance criteria
The procedure shall also include means to update test results and record findings during the
testing.
The document shall serve as basis for verification of item no. 29 in section 4.1.
This documentation shall be submitted to the Society upon request and shall describe the
supplier's processes and controls in accordance with requirements for secure development
lifecycle in section 5. Software updates and patching shall be described. The document shall
prepare the Society for survey as per section 6.3.4.
This document shall be submitted to the Society upon request and shall include procedures
for security-related maintenance and testing of the system. The document shall include
instructions for how the user can verify correct operation of the system's security functions as
required by item no.19 in section 4.1.
3.1.8 Information supporting the owner’s incident response and recovery plan
This document shall be submitted to the Society upon request and shall include procedures
or instructions allowing the user to accomplish the following:
This document shall be submitted to the Society upon request. It is expected that this
procedure is not specific for cyber security and is also required by UR E22.
CBSs with Type approval certificate covering the security capabilities of this UR may be
exempted from survey by the Society. However, test reports signed by the supplier shall be
submitted to the Society, demonstrating that the supplier has completed design, construction,
testing, configuration, and hardening as would otherwise be verified by the Society in survey
(section 6.3).
4 System Requirements
E27
(cont) This section specifies the required security capabilities for CBSs in the scope specified in
section 1.3.
The requirements in this section are based on the selected requirements in IEC 62443-3-3.
To determine the full content, rationale and relevant guidance for each requirement, the
reader should consult the referenced standard.
The following security capabilities are required for all CBSs in the scope specified in section
1.3.
Table 1
9 Wireless use The CBS shall provide the capability to authorize, monitor
E27 control and enforce usage restrictions for wireless connectivity to the
(cont) system according to commonly accepted security industry
practices
(IEC 62443-3-3/SR 2.2)
10 Use control for When the CBS supports use of portable and mobile devices,
portable and the system shall include the capability to
mobile devices a) Limit the use of portable and mobile devices only to those
permitted by design
b) Restrict code and data transfer to/from portable and
mobile devices
Note: Port limits / blockers (and silicone) could be accepted
for a specific system
(IEC 62443-3-3/SR 2.3)
11 Mobile code The CBS shall control the use of mobile code such as java
scripts, ActiveX and PDF.
(IEC 62443-3-3/SR 2.4)
12 Session lock The CBS shall be able to prevent further access after a
configurable time of inactivity or following activation of manual
session lock.
(IEC 62443-3-3/SR 2.5)
13 Auditable events The CBS shall generate audit records relevant to security for
at least the following events: access control, operating
system events, backup and restore events, configuration
changes, loss of communication.
(IEC 62443-3-3/SR 2.8)
14 Audit storage The CBS shall provide the capability to allocate audit record
capacity storage capacity according to commonly recognized
recommendations for log management. Auditing mechanisms
shall be implemented to reduce the likelihood of such
capacity being exceeded.
(IEC 62443-3-3/SR 2.9)
15 Response to audit The CBS shall provide the capability to prevent loss of
processing failures essential services and functions in the event of an audit
processing failure.
(IEC 62443-3-3/SR 2.10)
16 Timestamps The CBS shall timestamp audit records.
(IEC 62443-3-3/SR 2.11)
Protect the integrity of the CBS against casual or coincidental manipulation
17 Communication The CBS shall protect the integrity of transmitted information.
integrity Note: Cryptographic mechanisms shall be employed for
wireless networks.
(IEC 62443-3-3/SR 3.1)
18 Malicious code The CBS shall provide capability to implement suitable
protection protection measures to prevent, detect and mitigate the
effects due to malicious code or unauthorized software. It
shall have the feature for updating the protection mechanisms
(IEC 62443-3-3/SR 3.2)
19 Security The CBS shall provide the capability to support verification of
functionality the intended operation of security functions and report when
verification anomalies occur during maintenance
(IEC 62443-3-3/SR 3.3)
Ensure that the control system operates reliably under normal production conditions
24 Denial of service The CBS shall provide the minimum capability to maintain
protection essential functions during DoS events.
Note: It is acceptable that the CBS may operate in a
degraded mode upon DoS events, but it shall not fail in a
manner which may cause hazardous situations. Overload-
based DoS events should be considered, i.e. where the
networks capacity is attempted flooded, and where the
resources of a computer is attempted consumed.
(IEC 62443-3-3/SR 7.1)
25 Resource The CBS shall provide the capability to limit the use of
management resources by security functions to prevent resource
exhaustion.
(IEC 62443-3-3/SR 7.2)
26 System backup The identity and location of critical files and the ability to
conduct backups of user-level and system-level information
(including system state information) shall be supported by the
CBS without affecting normal operations
(IEC 62443-3-3/SR 7.3)
27 System recovery The CBS shall provide the capability to be recovered and
and reconstitution reconstituted to a known secure state after a disruption or
failure.
(IEC 62443-3-3/SR 7.4)
28 Alternative power The CBS shall provide the capability to switch to and from an
source alternative power source without affecting the existing
security state or a documented degraded mode.
(IEC 62443-3-3/SR 7.5)
29 Network and The CBS traffic shall provide the capability to be configured
E27 security according to recommended network and security
(cont) configuration configurations as described in guidelines provided by the
settings supplier. The CBS shall provide an interface to the currently
deployed network and security configuration settings.
(IEC 62443-3-3/SR 7.6)
30 Least Functionality The installation, the availability and the access rights of the
following shall be limited to the strict needs of the functions
provided by the CBS:
- operating systems software components, processes and
services
- network services, ports, protocols, routes and hosts
accesses and any software
(IEC 62443-3-3/SR 7.7)
The following additional security capabilities are required for CBSs with network
communication to untrusted networks (i.e. interface to any networks outside the scope of UR
E26).
CBSs with communication traversing the boundaries of security zones shall also meet
requirements for network segmentation and zone boundary protection in UR E26 section
4.2.1 and 4.2.2.
Table 2
37 Remote session The CBS shall provide the capability to terminate a remote
E27 termination session either automatically after a configurable time period
(cont) of inactivity or manually by the user who initiated the session.
(IEC 62443-3-3/SR 2.6)
38 Cryptographic The CBS shall employ cryptographic mechanisms to
integrity protection recognize changes to information during communication with
or via untrusted networks.
(IEC 62443-3-3/SR 3.1, RE1)
39 Input validation The CBS shall validate the syntax, length and content of any
input data via untrusted networks that is used as process
control input or input that directly impacts the action of the
CBS.
(IEC 62443-3-3/SR 3.5)
40 Session integrity The CBS shall protect the integrity of sessions. Invalid
session IDs shall be rejected.
(IEC 62443-3-3/SR 3.8)
41 Invalidation of The system shall invalidate session IDs upon user logout or
session IDs after other session termination (including browser sessions).
session termination (IEC 62443-3-3/SR 3.8, RE1)
A document, shall be produced that records how the security aspects have been addressed
in above phases and shall at minimum integrate controlled processes as set out in below 5.1
to 5.7. The said document is required to be submitted to class for review and approval.
5.1 (IEC 62443-4-1/SM-8) The manufacturer shall have procedural and technical controls in
place to protect private keys used for code signing, if applicable, from unauthorized access or
modification.
b) Instructions on how to apply approved patches manually and via an automated process;
c) Description of any impacts that applying the patch to the product can have, including
reboot;
E27 d) Instructions on how to verify that an approved patch has been applied; and
(cont)
e) Risks of not applying the patch and mediations that can be used for patches that are
not approved or deployed by the asset owner.
a) Stating whether the product is compatible with the dependent component or operating
system security update;
5.4 (IEC 62443-4-1/SUM-4) A process shall be employed to ensure that security updates
for all supported products and product versions are made available to product users in a
manner that facilitates verification that the security patch is authentic.
IACS supplement: The manufacturer shall have QA process to test the updates before
releasing.
5.5 (IEC 62443-4-1/SG-1) A process shall exist to create product documentation that
describes the security defence in depth strategy for the product to support installation,
operation and maintenance that includes:
a) Security capabilities implemented by the product and their role in the defence in depth
strategy;
c) Product user mitigation strategies for known security risks associated with the product,
including risks associated with legacy code.
a) Integration of the product, including third-party components, with its product security
context
ii. descriptions of configurable and default values that include how each affects security
E27 along with any potential impact each has on work practices; and
(cont)
iii. setting/changing/deleting its value;
e) Instructions and recommendations for the use of all security-related tools and utilities
that support administration, monitoring, incident handling and evaluation of the security
of the product;
g) Instructions for reporting security incidents for the product to the supplier;
h) Description of the security best practices for maintenance and administration of the
product.
6 Demonstration of compliance
6.1 Introduction
Suppliers shall in cooperation with the System integrator determine if UR E27 is mandatory
for the CBS, see Figure 1.
Figure 1
Yes
Figure 2
Yes
Survey and factory acceptance test
(UR E27 sec. 6.3)
Plan approval
Reduced set of documents
(UR E27 sec. 6.2)
System Cer�ficate
(UR E22 sec. 2)
Type approval is voluntary and applies for CBSs that are standard and routinely
E27 manufactured. See UR E22 for definition of System certification and Type approval.
(cont)
The process in Figure 1 and Figure 2 applies also if other equivalent standards are applied
for navigation and radiocommunication equipment (see section 1.3). In such case:
- the process in Figure 1 illustrates if the equivalent standard is mandatory (in lieu of UR
E27)
- the process in Figure 2 illustrates that the certification process is lessened if the CBS has
been type approved in accordance with the equivalent standard.
Plan approval is assessment of documents of a CBS intended for a specific vessel. The
documents in section 3 are required to be submitted by the supplier. The documents shall
enable the Society to verify compliance with requirements in this UR.
If the CBS holds a valid Type approval certificate covering the requirements of this UR,
subject to approval by the Society, the supplier may submit a reduced set of vessel-specific
documents to the Society (see Appendix II).
The approved version of the documents shall be included in the delivery of the CBS to the
system integrator.
Survey and factory acceptance testing (FAT) is a vessel-specific verification activity required
for CBSs that do not hold a valid Type approval certificate covering the requirements of this
UR.
The objective of the survey and FAT is to demonstrate by testing and/or analytic evaluation
that the CBS complies with applicable requirements in this UR. The survey and FAT shall be
carried out at the supplier’s premises or at other works having the adequate apparatus for
testing and inspection.
After completed plan approval and survey/FAT, the Society will issue a System certificate that
shall accompany the CBS upon delivery to the system integrator.
The supplier shall demonstrate that design, construction, and internal testing has been
completed.
It shall also be demonstrated that the system to be delivered is correctly represented by the
approved documentation. This shall be done by inspecting the system and comparing the
components and arrangement/architecture with the asset inventory (section 3.1.1) and the
topology diagrams (section 3.1.2).
The tests shall provide the class surveyor with reasonable assurance that all requirements
are met. This implies that testing of identical components is normally not required.
The supplier shall test/demonstrate for the class surveyor that security settings in the
system’s components have been configured in accordance with the configuration guidelines
in section 3.1.5. This demonstration may be carried out in conjunction with testing of the
security capabilities.
The security settings shall be documented in a report, e.g. a ship-specific instance of the
configuration guidelines.
This requirement applies if the system includes software that is digitally signed for the
purpose of enabling the user to verify its authenticity.
The supplier shall present management system documentation substantiating that policies,
procedures and technical controls are in place to protect generation, storage and use of
private keys used for code signing from unauthorized access.
The policies and procedures shall address roles, responsibilities and work processes. The
technical controls shall include e.g. physical access restrictions and cryptographic hardware
(e.g. Hardware security module) for storage of the private key.
The supplier shall present management system documentation substantiating that a process
is established in the organization to ensure security updates are informed to the users. The
information to the users shall include the items listed in section 5.2.
The supplier shall present management system documentation, as required by section 5.3,
substantiating that a process is established in the organization to ensure users are informed
whether the system is compatible with updated versions of acquired software in the system
(new versions/patches of operating system or firmware). The information shall address how
to manage risks related to not applying the updated acquired software.
The supplier shall present management system documentation, as required by section 5.5,
substantiating that a process is established in the organization to document a strategy for
defence-in-depth measures to mitigate security threats to software in the CBS during
installation, maintenance and operation.
The supplier shall present management system documentation, as required by section 5.6,
substantiating that a process is established in the organization to document defence-in-depth
measures expected to be provided by the external environment, such as physical
arrangement, policies and procedures.
The supplier shall present management system documentation, as required by section 5.7,
substantiating that a process is established in the organization to ensure that hardening
guidelines are produced for the system.
The guidelines shall specify how to reduce vulnerabilities in the system by removal/prohibiting
/disabling of unnecessary software, accounts, services, etc.
Appendix I
E27
(cont)
Requirements:
Credits:
II. IEC 62443-3-3 (2013): Industrial communication networks – Network and system
security. Part 3-3: System security requirements and security levels
III. IEC 62443-4-1 (2018): Security for industrial automation and control systems Part 4-1:
Secure product development lifecycle requirements
Appendix II
E27
(cont) The following table summarizes documents to be submitted by the supplier to the Society.
Topology diagrams Enabling System integrator to design security zones and conduits
Approve 1) 2)
(E27 sec.3.1.2) (E26 sec.4.2.1)
Deterministic output
Information supporting incident Info 1)
(E27 sec.4.1 item 20)
response and recovery plans
(E27 sec.3.1.8) System backup
Info 1)
(E27 sec.4.1 item 26)
End of
Document